Arbitrary File Inclusion Vulnerability Affects Category Ajax Filter Plugin for WordPress
CVE-2024-10871
9.8CRITICAL
Summary
The Category Ajax Filter plugin for WordPress is prone to a Local File Inclusion vulnerability via the 'params[caf-post-layout]' parameter. This flaw affects all versions up to and including 2.8.2, allowing unauthenticated attackers to include and execute arbitrary files on the server. This exploitation can facilitate the execution of PHP code found within the included files, potentially bypassing access controls, revealing sensitive information, or allowing the upload and inclusion of harmful PHP files.
Affected Version(s)
Category Ajax Filter * <= 2.8.2
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
ngocanh le